{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T02:50:03Z","timestamp":1761015003284,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642319112"},{"type":"electronic","value":"9783642319129"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31912-9_12","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T07:57:56Z","timestamp":1342252676000},"page":"169-185","source":"Crossref","is-referenced-by-count":17,"title":["Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations"],"prefix":"10.1007","author":[{"given":"Shuguo","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yongbin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Jiye","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Danyang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E. Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-36400-5_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"D. Agrawal","year":"2003","unstructured":"Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM Side-Channel(s). In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 29\u201345. Springer, Heidelberg (2003)"},{"issue":"2","key":"12_CR3","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s13389-011-0010-2","volume":"1","author":"J. Doget","year":"2011","unstructured":"Doget, J., Prouff, E., Rivain, M., Standaert, F.-X.: Univariate side channel attacks and leakage modeling. Journal Cryptographic Engineering\u00a01(2), 123\u2013144 (2011)","journal-title":"Journal Cryptographic Engineering"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-85053-3_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"B. Gierlichs","year":"2008","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis - A Generic Side-Channel Distinguisher. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 426\u2013442. Springer, Heidelberg (2008)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Huang, J., Zhou, Y., Liu, J.: Measuring the effectiveness of dpa attacks - from the perspective of distinguishers statistical characteristics. In: IEEE ICCSIT 2010, pp. 161\u2013168 (2010)","DOI":"10.1109\/ICCSIT.2010.5564843"},{"key":"12_CR6","unstructured":"Haykin, S.: Neural Networks and Learning Machines, 3rd edn. Pearson (2009)"},{"key":"12_CR7","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Techniques, 2nd edn. Elseview Inc. (2006)"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"12_CR9","unstructured":"Weierstrass, K.: \u00dcber die analytische Darstellbarkeit sogenannter willk\u00fcrlicher Functionen einer reellen Ver\u00e4nderlichen. Sitzungsberichte der Kniglich Preuischen Akademie der Wissenschaften zu Berlin (1885) II"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-642-21031-0_15","volume-title":"Information Security Practice and Experience","author":"J. Liu","year":"2011","unstructured":"Liu, J., Zhou, Y., Han, Y., Li, J., Yang, S., Feng, D.: How to Characterize Side-Channel Leakages More Accurately? In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol.\u00a06672, pp. 196\u2013207. Springer, Heidelberg (2011)"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/11894063_14","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"T.-H. Le","year":"2006","unstructured":"Le, T.-H., Cl\u00e9di\u00e8re, J., Canovas, C., Robisson, B., Servi\u00e8re, C., Lacoume, J.-L.: A Proposition for Correlation Power Analysis Enhancement. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 174\u2013186. Springer, Heidelberg (2006)"},{"key":"12_CR12","unstructured":"Mangard, S., Oswald, E., Popp, S.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer (2007)"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/978-3-642-01957-9_31","volume-title":"Applied Cryptography and Network Security","author":"E. Prouff","year":"2009","unstructured":"Prouff, E., Rivain, M.: Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol.\u00a05536, pp. 499\u2013518. Springer, Heidelberg (2009)"},{"key":"12_CR14","unstructured":"Hoogvorst, P.: The Variance Power Analysis. In: Proceeding of COSADE 2010, pp. 4\u20139 (2010)"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-20465-4_8","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"M. Renauld","year":"2011","unstructured":"Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol.\u00a06632, pp. 109\u2013128. Springer, Heidelberg (2011)"},{"key":"12_CR16","unstructured":"Hecht-Nielsen, R.: Kolmogorov\u2019s Mapping Neural Network Existence Theorem. In: Proceedings of First IEEE International Conference on Neural Networks, San Diego, CA, pp. 11\u201314 (1987)"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11545262_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"W. Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A Stochastic Model for Differential Side Channel Cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 30\u201346. Springer, Heidelberg (2005)"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-642-00730-9_16","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"F.-X. Standaert","year":"2009","unstructured":"Standaert, F.-X., Gierlichs, B., Verbauwhede, I.: Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol.\u00a05461, pp. 253\u2013267. Springer, Heidelberg (2009)"},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-642-04138-9_30","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"N. Veyrat-Charvillon","year":"2009","unstructured":"Veyrat-Charvillon, N., Standaert, F.-X.: Mutual Information Analysis: How, When and Why? In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 429\u2013443. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31912-9_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:06:09Z","timestamp":1743739569000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31912-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319112","9783642319129"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31912-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}